Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Networks and Communications,Information Systems
Reference47 articles.
1. Huang, Y., Negrete, J., Wagener, J., Fralick, C., Rodriguez, A., Peterson, E., & Wosotowsky, A. (2022). Graph neural networks and cross-protocol analysis for detecting malicious IP addresses. Complex & Intelligent Systems. https://doi.org/10.1007/s40747-022-00838-y
2. Shahraki, A., Abbasi, M., Taherkordi, A., & Jurcut, A. D. (2022). A comparative study on online machine learning techniques for network traffic streams analysis. Computer Networks, 207, 108836. https://doi.org/10.1016/j.comnet.2022.108836
3. Moura, G.C.M., Sadre, R., & Pras, A. (2014). Internet bad neighborhoods temporal behavior. In 2014 IEEE network operations and management symposium (NOMS) (pp. 1–9). https://doi.org/10.1109/NOMS.2014.6838306
4. Wu, Y., Wei, D., & Feng, J. (2020). Network attacks detection methods based on deep learning techniques: A survey. Security and Communication Networks, 2020, 1–17.
5. Lu, J., Liu, A., Dong, F., Gu, F., Gama, J., & Zhang, G. (2018). Learning under concept drift: A review. IEEE Transactions on Knowledge and Data Engineering, 31(12), 2346–2363.